Monday, August 8, 2011

Secrets of Email Hacking - Keylogging and preventive measures taken against it

Hi friends, Welcome to the " krazzy2hack". Guys, After surfing a lot on internet i did found that there is no complete and perfect tutorial on email hacking and preventive measures to safeguard yourself, they good but scattered throught the web. So, i decided to make all in one package of

SECRETS OF EMAIL HACKING

KEY FEATURES OF " SECRETS OF EMAILHACKING " PACKAGE INCLUDES

Revealing all possible ways of hacking an email account one by one

Step by Step description with fully illustrated diagrams.

Download all hacking tools and anti-hacking softwares used in this tutorial for free.

Free download hacking ebook and other pdf guides.

Video demonstration on demand.

Make you aware of latest Internet scams and case studies.

Now a days Internet has been crowded by various methods of hacking an email account. A few of them work but most of them are fake and are intented to fool you and steal your valuable money. Therefore the objective of this study package is to make you aware of various email hacking skills and steps to prevent you from these attacks. As we discussed that a verity of email hacking tricks are wide spread , In this package we will be discussing most commonly used hacking techniques , its pros and cons , truth behind them and lots more...

☞ KEYLOGGERS [ EASY ]

Record the username and password instantly using both Software and
Hardware keyloggers.

Create your own phishing (fake page of a website) , and ask victim to log
into it. And his/her username & password will be stored in another
file on your website.

☞COOKIE STEALING AND SESSION HIJACKING [ DIFFICULT ]

Web browser stores cookie to keep your session alive as you log in to
email sites. Ask your victim to click on the link via email or on chat .
Their cookie gets saved in a file on your site. Download the cookie script
and inject it into your browser and open the respective website, will take
you to victim's inbox without any password required.☞SNIFFING [ AVERAGE ]Hacking into Lan or WiFi connected network, sniffing data passing
through the router. And hack victim's username and password.

If you find any other means of email hacking that has not been listed above. Share with us !!

SECRETS OFE✉AILHACKING: KEYLOGGING

Now a days, Everyone is asking how can i hack email account of my friend , x-girlfriend or x-boyfriend ? Is there any way to monitor what my children search for on internet? With whom they chat ? What do they talk about ? Are they safe ? Do you feel your mate is cheating you? Do you want to keep an eye over your suspected clients. The Simplest Answer to your these question and lots other is Keylogging.

CASE STUDIES :

# In February 2006, the Brazilian police arrested 55 people involved in spreading malicious programs which were used to steal user information and passwords to banking systems. The keyloggers were activated when the users visited their banks’ websites, and secretly tracked and subsequently sent all data entered on these pages to cyber criminals. The total amount of money stolen from 200 client accounts at six of the country’s banks totaled $4.7million.

# On January 24, 2004 the notorious Mydoom worm caused a major epidemic and broke the record previously set by Sobig, provoking the largest epidemic in Internet history to date. The worm used social engineering methods and organized a DoS attack on www.sco.com; the site was either unreachable or unstable for several months as a consequence. The worm left a Trojan on infected computers which was subsequently used to infect the victim machines with new modifications of the worm. The fact that MyDoom had a keylogging function to harvest credit card numbers was not widely publicized in the media

WHAT ARE KEYLOGGERS ?

The term keylogger itself describes its function i.e keylogger = key + logger. That means keylogger is either a software program or a hardware device which is used to record each and every key strokes ( includes all the keys you have typed even special characters) on the specified or infected computer. keyloggers present no threat to the system itself. But pose a serious threat to users, as they can be used to intercept passwords, pin codes , credit cards detail and other confidential information entered via the keyboard. Basically there are two classes of keyloggers namely Software keyloggers and Hardware Keyloggers.

SOFTWARE KEYLOGGERS

Software keyloggers are small spy software that is designed to secretly monitor and log all keystrokes, track user activity, saves the information to the user’s hard disk in text or html logs and then secretly forward it to the Attacker's inbox. Let's see an example

For example: A computer has been infected by a keylogger program. When the victim goes to http://gmail.com and types his “username” and the “password” in the respective fields to login on his computer. The keylogger silently records these keystrokes and stores them in the log file . These logs when opened up shows the captured “username” and “password” and also the respective website address ( Here Gmail ). These keyloggers can easily be configured to send these logs to attacker's email silently without knowledge and permission of Victim. And your victim got hacked!!

ADVANTAGES OF USING SOFTWARE KEYLOGGER

ABSOLUTELY INVISIBLE AND UNDETECTABLE : These keyloggers work completely in stealth mode i.e. they cannot be found in list of installed programs , Task manager and even Add or Remove programs. So making it completely undetectable by user.

RECORD ALL PASSWORDS TYPED ON VICTIM'S PC : These Keyloggers are able to stores all alpha numeric , special characters ( like @ $ ! % * etc ), arrow keys, Caps lock , Shift and Back Space and all other key press. So even victim tries to make a complex and unbreakable password, becomes useless.

PASSWORD PROTECTION AND HOT KEY ACTIVATION : Since these keyloggers work in stealth ( invisible ) mode, they need a hot key combination to open e.g. [shift] + [Ctrl] + [f12] and sometimes even password to open it and for uninstallation too ( if set ).

TAKES SCREEN SHOTS OF DESKTOP AT FIXED INTERVAL OR PER CLICK AND SENDS TO THE ATTACKER

MONITOR MULTIPLE USER ACCOUNT ON A COMPUTER

AUTOMATICALLY STARTS WITH WINDOWS BOOT UP

VIEW LOGS AND SCREEN SHOTS DIRECTLY IN YOUR INBOX

COMES WITH REMOTE INSTALLATION FEATURE : There are many many keyloggers in the market which comes with remote installation feature i.e you can install the keylogger without having any physical access to victim's computer. The best keyloggers of this purpose are

As we discussed earlier not all but a few keyloggers come with remote installation feature. But unfortunately these keyloggers don't come free. However I'm going to show you how to install these keyloggers having remote installation feature on victim's computer. In our case lets take the example of Sniper Spy. For even more detailed description and purchasing details visit their sites.

After you purchase Sniperspy, you will have to create the remote installation module using easy set-up program which can be freely downloaded from sniper spy website. You need to email this module to the victim user as an attachment and wait for his /her click .

OR you can zip this module, upload this file on any download server like fileden.com , ziddu.com and send the victim, link to download this file on chat or send a fake mail.

TIP :You can even bind this remote installation module with any image , pdf , flash games and then upload it. After the victim downloads and extracts *.zip file , he will find image, or game with which you binded the module . When user double clicks image or flash file, it will open up and your module will be installed in background silently .

After the module has been installed silently, monitoring process will begin. The keystrokes captured will be uploaded to the SniperSpy servers continuously.

You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

DISADVANTAGES OF SOFTWARE KEYLOGGERS

As I already mentioned that these keyloggers work completely in stealth mode i.e they are completely invisible due to their rootkit functionality. Therefore they behave almost as a trojan sending data ( Here logs containing keystrokes ) anonymously to the attacker. Due to this fact most Antivirus company have updated their database, adding signatures of these keyloggers . Hence It may be detected as a Virus or Trojan by your Antivirus.

Avoid visiting the suspicious sites which promote porn as they could remotely install Trojans and virus having keylogging feature on your computer silently to seal your sensetive datas.

If you work on a Public computer then disable usb drives for preventing any one from installing malicious programs.

Use onscreen keyboard to enter your credentials on a form on any website. For example Type osk in run dialog box to activate On Screen Keyboad in windows, Install orca onscreen keyboard for linux.

HARDWARE KEYLOGGERS

Hardware keyloggers as name suggests are hardware devices which when plugged in between CPU and your Keyboard , starts recording the keystorkes in the internal flash , non volatile memory within the keylogger itself. Basically they contain a microcontroller, which interprets the datastream between the keyboard and CPU, processes it, and passes it to the non-volatile internal memory ( the stored data is not lost even when power is lost ) . These stored data can be retrived by typing a special password (you set before installation) on your text editor like notepad followed by " enter " .

HOW DO THEY LOOK LIKE?

Hardware keyloggers are usually black in colour ( to make it unnoticeable) and measure about 5cm in length. They commonly have storage capacity ranging from 64KB to 4MB. A keylogger having 256KB of internal memory can record about 128 pages of text. These class of keyloggers are relatively more expensive than software keyloggers depending upon their internal memory.

WHAT ARE THE BASIC STEPS TO INSTALL HARDWARE KEYLOGGERS ?

Plug the keylogger into your system. Configure the keylogger correctly i.e. set up the password and put it in recording mode and follw these steps sequentially .

Unplug the victim's keyboard and plug the keylogger in between your CPU port and keyboard.

Keylogger is now ready to record any key press on victim's keyboard.

And most important, pray that victim doesn't notices it.

After installing the keylogger correctly , it looks like

Once the keylogger is plugged in, it will begin recording all keystrokes, even ones entered before the PC is in windows or whatever OS you use.

ADVANTAGES OF USING HARDWARE KEYLOGGERS

Hardware Keyloggers are independent of operating system installed on victim computer.

These keyloggers have no chance of being detected by any antivirus program.

It gets activated and starts recording the keystrokes the moment system is turned on, So it even stores your login , BIOS or harddisk password (if set).

Now they are available for both PS/2 and usb type keyboards.

DISADVANTAGES OF USING HARDWARE KEYLOGGERS

It becomes handy only if you have physical access to victims computer

If noticed by the victim , you will subsequently loose all stored data and your keylogger too.

It becomes more costly as you move for higher storage.

HOW SHOULD I PURCHASE IT ?
There are many manufacturers of hardware keyloggers. The one presented in this instructable is a 2MB Keyshark, which cost about US$60. .Try to find these hard ware keyloggers near your locality in a computer shop or you may place an order online on any website sell these keyloggers . The best place to find them is eBay , Froogle , naaptol etc as many sites re-sell them for much more than they are worth. Just use Google to have a look, and you will find the same keylogger ranging from $60 to $90.

PREVENTIVE MEASURES TO SAFEGUARD FROM HARDWARE KEYLOGGERS ATTACK

Avoid suspicious people from accessing your computer.

Keep an eye for any unknown device being connected to your computer.

PLEASE WRITE WHAT YOU WOULD LIKE TO SEE NEXT ON COMMENTS SECTION BELOW :

Do you like us ?

Follow us on facebook by clicking here and stay updated about latest hack on your facebook wall